So many of my recent conversations have been about the criticality of CISOs and CIOs working together to protect their business. The hottest topics have been: - AI and automation to improve the management, tracking, and security of technology assets deployed in the field, providing CIOs and CISOs with actionable insights - Ensuring NIST compliance by ensuring that technology assets used in remote and field operations meet NIST compliance requirements, reducing the risk of regulatory violations and security breaches - Building resilience into field technology asset management practices, ensuring business continuity even in the face of disruptions. -Optimizing the lifecycle of technology assets used in remote and field environments, from deployment and maintenance to decommissioning and disposal. Jon Davis, Oomnitza's own fantastic CISO, is attending IDC’s CSO Conference & Awards next week to spend time networking with fellow CISO’s and CIOs to hear some out-of-the-box security thinking and approaches to cyber risk management that involve better technology asset management. Drop me a DM if you’ll be there. Jon is a great guy and I’d love to put the two of you in touch. #Oomnitza #CISO #CIO #ITAM #ETM #NIST #Compliance
Donna Wilczek’s Post
More Relevant Posts
-
SoCal CISO Community, tomorrow is your final Inner Circle Dinner of 2024! Join your peers at Meadowlark Golf Club in Huntington Beach to discuss "Modern CISO, Modern Data Security Strategy." In today's sophisticated threat landscape, data is both a valuable asset and a potential liability to the business. Rapid advancements and adoption of new technologies, increases in data complexity, and expanding regulatory oversight all pose significant challenges for security leaders. However, as the landscape evolves, so does the opportunity for CISOs to securely enable the business. The spotlight is now on CISOs to vigilantly measure and communicate the risks and value associated with data, implement appropriate DLP measures, and establish data security as a shared business responsibility. This conversation will be led by: Rudy Ramirez, CISO, Citizens Business Bank Tina Mitchell, CISO, Covered California Jeff Wade, Global Director, Cybersecurity, Taco Bell Richard Yun, CISO, Masimo There are still a few seats left for qualified InfoSec professionals. Apply to participate below! #EvantaCISO #SoCalCISO #DataSecurity
To view or add a comment, sign in
-
🔒💼 Championing Business Value: The Heart of a CISO 💼🔒 The role of a Chief Information Security Officer (CISO) has been ever evolving. The evolution has been much faster with the speed at which our digital landscape has changed in the last couple years. While protecting data, managing risks, and ensuring compliance are crucial, the essence of a CISO in this era lies in nurturing business growth and fostering innovation. Empowering innovation, serving as guardians of trust, and offering strategic guidance are just a few of the ways CISOs provide value beyond technical security functions. They are also the driving force behind resilience, building and maintaining relationships, and championing a people-centric approach to security. CISOs enable teams to innovate fearlessly, inspire trust and confidence in customers and stakeholders, and serve as trusted allies to the C-suite. In times of crisis, they work behind the scenes to ensure business continuity and emerge stronger than before. By embracing this holistic perspective, CISOs can unlock the full potential of security as a driver of business value and growth. #PeopleCentricSecurity #SecurityLeadership #CISO
To view or add a comment, sign in
-
NEW Great video post by Sid Wahi here at Balbix regarding how to fast-track your DORA Compliance, whilst being able to kick-start your journey! (1 1/2 mins) ENJOY 🚀 #dora #cybersecuritycompliance #ICT #ciso #financialservices #finance #digitaloperationalresilience #riskmanagement
As a #CISO of a financial organization that does business in Europe, you are required to have an information communication technology (#ICT) governance, risk, and compliance plan in place before the DORA (Digital Operational Resilience Act) kicks in January 17, 2025. In our recent webinar, Sid Wahi introduces the "operational resilience value chain method" to meet DORA requirements quickly. This approach involves five key steps: - Scoping: Identify what critical services your company provides, the essential processes needed to deliver these services, the assets involved, and the underlying infrastructure. - Assessment: Evaluate the risks, threats, and vulnerabilities that could impact these assets and services. - Controls: Review the security measures you have in place to protect against these risks and assess their effectiveness. - Risk Management: Understand all this information to establish a risk tolerance and resilience strategy for your business. - Continuous Monitoring: Complete the process with ongoing monitoring to detect and respond to risks promptly. Leveraging AI and automation in this process reduces manual tasks and accelerates compliance with #DORA, especially considering that the act kicks in less than 10 months from now. Find more practical insights on DORA implementation here: https://lnkd.in/gGHqQEuF #DORA #cybersecurity #EU #infosec #ICT
To view or add a comment, sign in
-
Super excited about this session! AI, the risks and value proposition plus data governance will certainly be topics of great interests for all security professionals.
SoCal CISO Community, tomorrow is your final Inner Circle Dinner of 2024! Join your peers at Meadowlark Golf Club in Huntington Beach to discuss "Modern CISO, Modern Data Security Strategy." In today's sophisticated threat landscape, data is both a valuable asset and a potential liability to the business. Rapid advancements and adoption of new technologies, increases in data complexity, and expanding regulatory oversight all pose significant challenges for security leaders. However, as the landscape evolves, so does the opportunity for CISOs to securely enable the business. The spotlight is now on CISOs to vigilantly measure and communicate the risks and value associated with data, implement appropriate DLP measures, and establish data security as a shared business responsibility. This conversation will be led by: Rudy Ramirez, CISO, Citizens Business Bank Tina Mitchell, CISO, Covered California Jeff Wade, Global Director, Cybersecurity, Taco Bell Richard Yun, CISO, Masimo There are still a few seats left for qualified InfoSec professionals. Apply to participate below! #EvantaCISO #SoCalCISO #DataSecurity
Southern California CISO Inner Circle - Agenda
evanta.com
To view or add a comment, sign in
-
Excited to share that I recently had the opportunity to sit down with Geetha Nandikotkur from Information Security Media Group (ISMG) Media Network, where we explored the evolving role of AI Governance in cybersecurity. With AI and Gen AI increasingly reshaping security practices, it has become critical for CISOs to implement robust governance frameworks. During our conversation, we delved into the some of the core aspects of AI governance. Stay tuned to ISMG Media for the full interview where we dive deeper into the future of AI-driven security and governance. #AIGovernance #cybersecurity #AI #GenAI #riskmanagement #innovation #AdvanceIntelligenceGroup
🚨 LIVE from #GovWare2024 🚨 In the spotlight now, we have Shishir Kumar Singh, Group Head of Information Security, Advance Intelligence Group who explores the latest trends and cutting-edge tech in cybersecurity with our editor Geetha Nandikotkur. Singh has more than 15 years of experience in spearheading robust cybersecurity strategies and programs that align with organizational objectives, ensuring compliance and fostering a culture of security excellence. His core competencies include strategic leadership, incident response, regulatory compliance and security risk management. Stay tuned to our ISMG media network for the full interview. #ISMGStudio #Govware2024 #ISMGatGovWare
To view or add a comment, sign in
-
There’s been a few particularly interesting developments in the world of #cybersecurity recently… BlueVoyant released a report on the state of #supplychain #security. Now, anyone remotely paying attention knows that it isn’t a rosy picture, but apparently it IS improving with 81% of organizations reporting negative impacts from supply chain breaches over the past twelve months, down from 94% in 2023. Huh. It’s progress, I suppose. https://lnkd.in/dg7zeWf6 And it’s all #AI all the time in the news these days, it seems. And the world of cybersecurity is no exception. NTT DATA, Inc. (client) and Palo Alto Networks recently announced a tie up where NTT DATA’s #MXDR offering gets a boost from Palo Alto Networks’ Cortex XSIAM, its security operations center (SOC) platform that uses AI and #automation to simplify operations, stop threats at scale and accelerate incident remediation. https://lnkd.in/d8wDrdK8 Speaking of incidents, this week at AWS #reInvent, Wiz launched its new, and might I say badass, Wiz Defend cloud detection and response platform that includes a bevy of partners, like Sygnia (client), so that customers have a built-in #IR team to beat attackers and stay secure. And for those of you following along (and are fans of the six degrees game), Wiz, who rejected an acquisition offer from #Alphabet, recently acquired Gem Security, which was founded by, you guessed it, a few Sygnia alum. https://lnkd.in/dJcKNXxZ And lastly, supply chain #defense may be improving ever so slightly, but it doesn’t seem like #criticalinfrastructure defense is faring so well if the recent spate of attacks by the infamous #SaltTyphoon are any indication. Orgs should follow Sygnia’s blog where they frequently share discoveries, updates and general flags when their spidey sense tingles around known and unknown threat actors. https://lnkd.in/dhdkCZG2 #incidentresponse #reInvent #cloudsecurity #threatresearch #threatintelligence Jennifer Schlesinger Amir Becker Shetal Mehta Wireside Communications®
The State of Supply Chain Defense in 2024 Report
bluevoyant.com
To view or add a comment, sign in
-
As organizations navigate the uncharted waters of technological innovation, understanding and managing associated risks is crucial. This month, SVIC emphasizes the importance of proactive risk management in areas like cybersecurity, regulatory compliance, operational integrity, reputation, and strategic alignment. Our programs equip executives with the skills to: * Identify cybersecurity vulnerabilities * Navigate complex regulatory landscapes * Smoothly integrate disruptive technologies * Safeguard reputation and operational efficiency * Align tech investments with strategic goals Engage with our expert-led Executive Education https://hubs.li/Q02wYPG30 and Consulting Services https://hubs.li/Q02wYNjP0 to transform these challenges into strategic advantages. #RiskManagement #TechInnovation #LeadershipInChange
To view or add a comment, sign in
-
Cybersecurity has overtaken business interruption as the top concern for executives across industries. While investing in security can be costly, the price of weak defenses can be even higher. Join us for a live virtual event on October 30 as we explore how business leaders are integrating security compliance with new regulations into their technology investment strategies. Learn how to ensure your enterprise is equipped with robust risk mitigation systems to stay protected. Save your free seat: https://lnkd.in/gjU6HaVe #CIO #CFO #AI
To view or add a comment, sign in
-
The landscape of business operations is evolving rapidly, with complex regulations and cyber threats on the rise. Manual compliance processes are no longer sufficient in this environment. That's where GRC automation tools come in, revolutionising Governance, Risk, and Compliance management. 🔍 Key Benefits: - Efficiency: By automating repetitive tasks, Sprinto free up time for strategic decision-making. - Risk Mitigation: Promptly identify and address compliance gaps in real-time. - Scalability: Sprinto easily adjust to meet the growing demands of regulatory requirements. - Audit-Ready: Keeping you constantly prepared with updated records and reports. Embracing GRC automation tools isn't just a passing trend; it's a crucial step towards sustainable growth and resilience against risks in today's dynamic business landscape. 🌐💼 #Sprinto #GRC #ComplianceAutomation #RiskManagement #BusinessGrowth
To view or add a comment, sign in
-
𝗧𝗵𝗲 𝗥𝗲𝗰𝗲𝗻𝘁 𝗢𝘂𝘁𝗮𝗴𝗲𝘀: 𝗔 𝗦𝘁𝗮𝗿𝗸 𝗥𝗲𝗺𝗶𝗻𝗱𝗲𝗿 𝗼𝗳 𝘁𝗵𝗲 𝗜𝗺𝗽𝗼𝗿𝘁𝗮𝗻𝗰𝗲 𝗼𝗳 𝗗𝗼𝗿𝗮 𝗖𝗼𝗺𝗽𝗹𝗶𝗮𝗻𝗰𝗲 The cascading effects of the recent Microsoft and CrowdStrike outages serve as a stark reminder of the interconnectedness of our digital world. Such disruptions highlight the urgent need for robust operational resilience, particularly within the financial sector. #DoraCompliance provides a comprehensive framework for organizations to build resilience against such unforeseen challenges. By emphasizing incident management, recovery planning, and third-party risk management, Dora helps financial institutions safeguard customer data, maintain business continuity, and meet regulatory obligations. In today's complex regulatory landscape, compliance is no longer just a box to tick. It's a strategic imperative. Organizations that prioritize Dora compliance are better equipped to navigate crises, protect their reputation, and foster trust with customers. #Compliance #cybersecurity #operationalresilience #riskmanagement #DORA
To view or add a comment, sign in
Principal Solution Consultant - Sourcing Optimization
1moCSO.....